Analysis

  • max time kernel
    95s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08-12-2024 12:55

General

  • Target

    голые фотографии акима.exe

  • Size

    3.7MB

  • MD5

    934f077da68d3fda26839f06286b71e4

  • SHA1

    f805ec2e43d7518d420b94b954fd6b4e640ef64d

  • SHA256

    0e1ea55667ec6d7ed658718be1528ce3f5e5ac464113e114a96379004137787b

  • SHA512

    85e2bff55ce5aa6569d50146a3d95c611f774605fa9a8ee041cede3a928bf7585943e63aaf9eb5b14dc4d25fe6bee3e57d58c9b586653322300aaa67e87dd714

  • SSDEEP

    49152:UbA30FDlon6ZtXRUNAtf3zkDcpigc4Jp8+bF5BxiLFHqzQ6yQH2lJwtYv2:UbZ7tXyNAtf3Rigc4n58xHqzQ6TH2Lel

Malware Config

Signatures

  • DcRat

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • Dcrat family
  • Process spawned unexpected child process 45 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • UAC bypass 3 TTPs 9 IoCs
  • DCRat payload 2 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Checks computer location settings 2 TTPs 5 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 6 IoCs
  • Checks whether UAC is enabled 1 TTPs 6 IoCs
  • Drops file in Program Files directory 8 IoCs
  • Drops file in Windows directory 7 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 3 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 45 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 31 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of WriteProcessMemory 35 IoCs
  • System policy modification 1 TTPs 9 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\голые фотографии акима.exe
    "C:\Users\Admin\AppData\Local\Temp\голые фотографии акима.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:3672
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\BridgehyperchainportAgent\lcZ6MvLb.vbe"
      2⤵
      • Checks computer location settings
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4056
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c ""C:\BridgehyperchainportAgent\akmRZ8KYIwqCrue04KkAUPxFzhoyZ.bat" "
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1524
        • C:\BridgehyperchainportAgent\hyperblockDll.exe
          "C:\BridgehyperchainportAgent\hyperblockDll.exe"
          4⤵
          • UAC bypass
          • Checks computer location settings
          • Executes dropped EXE
          • Checks whether UAC is enabled
          • Drops file in Program Files directory
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          • System policy modification
          PID:3428
          • C:\Program Files (x86)\Mozilla Maintenance Service\logs\dllhost.exe
            "C:\Program Files (x86)\Mozilla Maintenance Service\logs\dllhost.exe"
            5⤵
            • UAC bypass
            • Checks computer location settings
            • Executes dropped EXE
            • Checks whether UAC is enabled
            • Modifies registry class
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            • System policy modification
            PID:4444
            • C:\Windows\System32\WScript.exe
              "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\433cf409-5e2a-4d20-8451-5b10fa570636.vbs"
              6⤵
              • Suspicious use of WriteProcessMemory
              PID:4984
              • C:\Program Files (x86)\Mozilla Maintenance Service\logs\dllhost.exe
                "C:\Program Files (x86)\Mozilla Maintenance Service\logs\dllhost.exe"
                7⤵
                • Executes dropped EXE
                • Suspicious use of AdjustPrivilegeToken
                PID:628
            • C:\Windows\System32\cmd.exe
              "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\t81RsG07iY.bat"
              6⤵
              • Suspicious use of WriteProcessMemory
              PID:4528
              • C:\Windows\system32\w32tm.exe
                w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                7⤵
                  PID:3236
                • C:\Program Files (x86)\Mozilla Maintenance Service\logs\dllhost.exe
                  "C:\Program Files (x86)\Mozilla Maintenance Service\logs\dllhost.exe"
                  7⤵
                  • UAC bypass
                  • Checks computer location settings
                  • Executes dropped EXE
                  • Checks whether UAC is enabled
                  • Modifies registry class
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of WriteProcessMemory
                  • System policy modification
                  PID:3672
                  • C:\Windows\System32\WScript.exe
                    "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\f6b24f32-a5f1-4863-92fa-95a87dad1a43.vbs"
                    8⤵
                    • Suspicious use of WriteProcessMemory
                    PID:2120
                    • C:\Program Files (x86)\Mozilla Maintenance Service\logs\dllhost.exe
                      "C:\Program Files (x86)\Mozilla Maintenance Service\logs\dllhost.exe"
                      9⤵
                      • Executes dropped EXE
                      • Suspicious use of AdjustPrivilegeToken
                      PID:2376
                  • C:\Windows\System32\cmd.exe
                    "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\89bpTfxCtz.bat"
                    8⤵
                    • Suspicious use of WriteProcessMemory
                    PID:3256
                    • C:\Windows\system32\w32tm.exe
                      w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                      9⤵
                        PID:2336
                      • C:\Program Files (x86)\Mozilla Maintenance Service\logs\dllhost.exe
                        "C:\Program Files (x86)\Mozilla Maintenance Service\logs\dllhost.exe"
                        9⤵
                        • Executes dropped EXE
                        • Suspicious use of AdjustPrivilegeToken
                        PID:4652
                • C:\Windows\System32\WScript.exe
                  "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\cf5705f3-b8a5-419d-a1fc-43e910ffb339.vbs"
                  6⤵
                    PID:4356
          • C:\Windows\SysWOW64\WScript.exe
            "C:\Windows\System32\WScript.exe" "C:\BridgehyperchainportAgent\file.vbs"
            2⤵
            • System Location Discovery: System Language Discovery
            PID:4196
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 12 /tr "'C:\Windows\CbsTemp\dllhost.exe'" /f
          1⤵
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:1448
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\Windows\CbsTemp\dllhost.exe'" /rl HIGHEST /f
          1⤵
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:4388
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 9 /tr "'C:\Windows\CbsTemp\dllhost.exe'" /rl HIGHEST /f
          1⤵
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:2600
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 11 /tr "'C:\Users\All Users\Package Cache\{9F51D16B-42E8-4A4A-8228-75045541A2AE}v56.64.8781\RuntimeBroker.exe'" /f
          1⤵
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:2212
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Users\All Users\Package Cache\{9F51D16B-42E8-4A4A-8228-75045541A2AE}v56.64.8781\RuntimeBroker.exe'" /rl HIGHEST /f
          1⤵
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:3484
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 12 /tr "'C:\Users\All Users\Package Cache\{9F51D16B-42E8-4A4A-8228-75045541A2AE}v56.64.8781\RuntimeBroker.exe'" /rl HIGHEST /f
          1⤵
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:1732
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "dwmd" /sc MINUTE /mo 9 /tr "'C:\Recovery\WindowsRE\dwm.exe'" /f
          1⤵
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:4104
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "dwm" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\dwm.exe'" /rl HIGHEST /f
          1⤵
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:4292
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "dwmd" /sc MINUTE /mo 13 /tr "'C:\Recovery\WindowsRE\dwm.exe'" /rl HIGHEST /f
          1⤵
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:572
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "taskhostwt" /sc MINUTE /mo 6 /tr "'C:\Program Files\Internet Explorer\SIGNUP\taskhostw.exe'" /f
          1⤵
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:1120
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "taskhostw" /sc ONLOGON /tr "'C:\Program Files\Internet Explorer\SIGNUP\taskhostw.exe'" /rl HIGHEST /f
          1⤵
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:4760
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "taskhostwt" /sc MINUTE /mo 12 /tr "'C:\Program Files\Internet Explorer\SIGNUP\taskhostw.exe'" /rl HIGHEST /f
          1⤵
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:876
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "upfcu" /sc MINUTE /mo 8 /tr "'C:\Windows\Provisioning\Packages\upfc.exe'" /f
          1⤵
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:4712
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "upfc" /sc ONLOGON /tr "'C:\Windows\Provisioning\Packages\upfc.exe'" /rl HIGHEST /f
          1⤵
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:4440
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "upfcu" /sc MINUTE /mo 11 /tr "'C:\Windows\Provisioning\Packages\upfc.exe'" /rl HIGHEST /f
          1⤵
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:4316
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "upfcu" /sc MINUTE /mo 10 /tr "'C:\Windows\ShellExperiences\upfc.exe'" /f
          1⤵
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:928
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "upfc" /sc ONLOGON /tr "'C:\Windows\ShellExperiences\upfc.exe'" /rl HIGHEST /f
          1⤵
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:4628
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "upfcu" /sc MINUTE /mo 9 /tr "'C:\Windows\ShellExperiences\upfc.exe'" /rl HIGHEST /f
          1⤵
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:3312
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "csrssc" /sc MINUTE /mo 9 /tr "'C:\BridgehyperchainportAgent\csrss.exe'" /f
          1⤵
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:5044
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\BridgehyperchainportAgent\csrss.exe'" /rl HIGHEST /f
          1⤵
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:512
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "csrssc" /sc MINUTE /mo 6 /tr "'C:\BridgehyperchainportAgent\csrss.exe'" /rl HIGHEST /f
          1⤵
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:4408
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "TextInputHostT" /sc MINUTE /mo 10 /tr "'C:\Users\Default\Videos\TextInputHost.exe'" /f
          1⤵
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:760
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "TextInputHost" /sc ONLOGON /tr "'C:\Users\Default\Videos\TextInputHost.exe'" /rl HIGHEST /f
          1⤵
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:4860
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "TextInputHostT" /sc MINUTE /mo 5 /tr "'C:\Users\Default\Videos\TextInputHost.exe'" /rl HIGHEST /f
          1⤵
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:4472
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 8 /tr "'C:\Program Files (x86)\Mozilla Maintenance Service\logs\dllhost.exe'" /f
          1⤵
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:2968
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\Program Files (x86)\Mozilla Maintenance Service\logs\dllhost.exe'" /rl HIGHEST /f
          1⤵
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:2584
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 10 /tr "'C:\Program Files (x86)\Mozilla Maintenance Service\logs\dllhost.exe'" /rl HIGHEST /f
          1⤵
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:2760
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 9 /tr "'C:\Users\Admin\Local Settings\RuntimeBroker.exe'" /f
          1⤵
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:2164
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Users\Admin\Local Settings\RuntimeBroker.exe'" /rl HIGHEST /f
          1⤵
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:3732
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 14 /tr "'C:\Users\Admin\Local Settings\RuntimeBroker.exe'" /rl HIGHEST /f
          1⤵
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:3544
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 12 /tr "'C:\Program Files\Uninstall Information\dllhost.exe'" /f
          1⤵
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:4108
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\Program Files\Uninstall Information\dllhost.exe'" /rl HIGHEST /f
          1⤵
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:3284
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 13 /tr "'C:\Program Files\Uninstall Information\dllhost.exe'" /rl HIGHEST /f
          1⤵
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:1308
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "servicess" /sc MINUTE /mo 7 /tr "'C:\Program Files (x86)\Windows Multimedia Platform\services.exe'" /f
          1⤵
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:228
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "services" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Multimedia Platform\services.exe'" /rl HIGHEST /f
          1⤵
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:2296
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "servicess" /sc MINUTE /mo 9 /tr "'C:\Program Files (x86)\Windows Multimedia Platform\services.exe'" /rl HIGHEST /f
          1⤵
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:1480
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "IdleI" /sc MINUTE /mo 10 /tr "'C:\Users\Admin\AppData\LocalLow\Sun\Java\Idle.exe'" /f
          1⤵
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:3788
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "Idle" /sc ONLOGON /tr "'C:\Users\Admin\AppData\LocalLow\Sun\Java\Idle.exe'" /rl HIGHEST /f
          1⤵
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:1472
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "IdleI" /sc MINUTE /mo 14 /tr "'C:\Users\Admin\AppData\LocalLow\Sun\Java\Idle.exe'" /rl HIGHEST /f
          1⤵
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:1644
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "SearchAppS" /sc MINUTE /mo 6 /tr "'C:\BridgehyperchainportAgent\SearchApp.exe'" /f
          1⤵
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:4284
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "SearchApp" /sc ONLOGON /tr "'C:\BridgehyperchainportAgent\SearchApp.exe'" /rl HIGHEST /f
          1⤵
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:3664
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "SearchAppS" /sc MINUTE /mo 6 /tr "'C:\BridgehyperchainportAgent\SearchApp.exe'" /rl HIGHEST /f
          1⤵
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:4368
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "taskhostwt" /sc MINUTE /mo 5 /tr "'C:\BridgehyperchainportAgent\taskhostw.exe'" /f
          1⤵
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:4240
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "taskhostw" /sc ONLOGON /tr "'C:\BridgehyperchainportAgent\taskhostw.exe'" /rl HIGHEST /f
          1⤵
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:3684
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "taskhostwt" /sc MINUTE /mo 7 /tr "'C:\BridgehyperchainportAgent\taskhostw.exe'" /rl HIGHEST /f
          1⤵
          • Process spawned unexpected child process
          • Scheduled Task/Job: Scheduled Task
          PID:1604

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\BridgehyperchainportAgent\akmRZ8KYIwqCrue04KkAUPxFzhoyZ.bat

          Filesize

          48B

          MD5

          efb9b32455839f2f1e46065e13aeb93f

          SHA1

          cae49ccdd500a9808ac144387b15ad6ced46c036

          SHA256

          611d9c30bfabaaa6e9aee5c75025b71dca9116c45300ac325febeefe2d5b0e24

          SHA512

          351d053f36e497238add089f19e30f164c1110be7826d58e7fb71705b06a7d6d51789add692ac08af4c1e613e3f9c54789a5c8f707ad302a70bcd379645cff1c

        • C:\BridgehyperchainportAgent\file.vbs

          Filesize

          34B

          MD5

          677cc4360477c72cb0ce00406a949c61

          SHA1

          b679e8c3427f6c5fc47c8ac46cd0e56c9424de05

          SHA256

          f1cccb5ae4aa51d293bd3c7d2a1a04cb7847d22c5db8e05ac64e9a6d7455aa0b

          SHA512

          7cfe2cc92f9e659f0a15a295624d611b3363bd01eb5bcf9bc7681ea9b70b0564d192d570d294657c8dc2c93497fa3b4526c975a9bf35d69617c31d9936573c6a

        • C:\BridgehyperchainportAgent\hyperblockDll.exe

          Filesize

          3.4MB

          MD5

          df6d3aff42df48d0830227cae92e6bd6

          SHA1

          bf7f75fd82694b2a44098df2b28c2db35e7ea142

          SHA256

          05b5df5bc84e193fba3aa26d1b20cb81faa7b176a24a8df2238c8ed61e6e583a

          SHA512

          07163831729582397fdbdcef5d921750b2968b9d555fd0b881913ae1b283573e4efc827d0eb51552882743b541e44ff2a8dbf0d99a4e5c3f47228a4536bab64a

        • C:\BridgehyperchainportAgent\lcZ6MvLb.vbe

          Filesize

          231B

          MD5

          05a47a3e17c29bf5b8bc6949a26ccb44

          SHA1

          87e896625a30943a252a839ba3e22507422bbb04

          SHA256

          85f873ac1def74dea8180c0cce0084490505d2bc213abf34d3a95fda4b92c63f

          SHA512

          72ef9bb092cfbc824341aa0075ee594b410e9afea3a8ae40c0f1743a4cb2528005701099ef156dc0f2a2da4474809f1d5995e01d12c6ac36f0cc7ae6baf8f64b

        • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\dllhost.exe.log

          Filesize

          1KB

          MD5

          655010c15ea0ca05a6e5ddcd84986b98

          SHA1

          120bf7e516aeed462c07625fbfcdab5124ad05d3

          SHA256

          2b1ffeab025cc7c61c50e3e2e4c9253046d9174cf00181a8c1de733a4c0daa14

          SHA512

          e52c26718d7d1e979837b5ac626dde26920fe7413b8aa7be6f1be566a1b0f035582f4d313400e3ad6b92552abb1dfaf186b60b875fb955a2a94fd839fe841437

        • C:\Users\Admin\AppData\Local\Temp\433cf409-5e2a-4d20-8451-5b10fa570636.vbs

          Filesize

          743B

          MD5

          6febcc673cd028a9ed2555ffdad49543

          SHA1

          381838b51dbf4938206a3a37e6e2f07dacb17fa8

          SHA256

          46f7f66dccd3d779780957eda59ef72217987f0b82cd63c934af048c33a6aee7

          SHA512

          685965946e66781e2828298f2e0bff5eb6e04fd94dc0a969350748155d6fecf7e3d065e975e9f8c5a33df388da75e2d115376552f0950cc21e589504b0b811e9

        • C:\Users\Admin\AppData\Local\Temp\89bpTfxCtz.bat

          Filesize

          232B

          MD5

          4939c2b7ea8b6e8e538d6c425f3b3f40

          SHA1

          4dba2a6e60103bd9846308eca31102d667a25e79

          SHA256

          e6999743c7ad1ac24d5adaf48c10ce74a864a39e9c7789e3cefba1865b4eec32

          SHA512

          d32dbb28ca87fc3cc3b70398b6ac5602b7e3c02c6a7ebb66800b69003b5f61f1875a40210d48618f268fa473715c59e61d7edbaa732be4ed754a35c6f84c020d

        • C:\Users\Admin\AppData\Local\Temp\cf5705f3-b8a5-419d-a1fc-43e910ffb339.vbs

          Filesize

          519B

          MD5

          36f7052484e44b4d1482d253ba070ad8

          SHA1

          3404485d954ab4b1ce75558d482bbd1a83ca6d41

          SHA256

          18d63dc43a29726b0ca3b943b7e0fdea6b51870992c5cc56f2c44748e71d1d9a

          SHA512

          08a5ffd003a53336a7a995b1017691005123adb913427bff45daf01ab7067099146369394567d7a09e08c9db7bbdd6b600586a58d6abb6b28707e7e380a28dfb

        • C:\Users\Admin\AppData\Local\Temp\f6b24f32-a5f1-4863-92fa-95a87dad1a43.vbs

          Filesize

          743B

          MD5

          160fdc67ea4080284341dde8edd84bed

          SHA1

          eae403b5abfbfd47e1c6783e979a131d9df3b23b

          SHA256

          5b8baa0dbcc0e574b355f05e167a4e4247ccb5a2361f3137be270abadc691a6e

          SHA512

          4dde79613582675521bb753248d61228279394c47a9701911ebe9e42d70977e308dfdadd6c6d6475aae9b0268baebaa265856718113978ff18439b493b2e8aba

        • C:\Users\Admin\AppData\Local\Temp\t81RsG07iY.bat

          Filesize

          232B

          MD5

          c1ca5209af05c1a50c88485983065f85

          SHA1

          7a392576e23d185f991c1e80f32204305c00b64a

          SHA256

          340995fbee2e7d8e7881c8bd63bdce2ef518924ac6f0478040f8a4c222c901fc

          SHA512

          a224fc0d5a25bb9fd6c2c178fd1f1e9af494739f8ceb6bfd6d79162e117715d1b5ff0edfbc91d594b77dfe36c6c7fab9a391b6d0092497f2462e9ce0d632bfb0

        • memory/3428-37-0x000000001BD50000-0x000000001BD62000-memory.dmp

          Filesize

          72KB

        • memory/3428-42-0x000000001C730000-0x000000001C73C000-memory.dmp

          Filesize

          48KB

        • memory/3428-25-0x0000000003200000-0x0000000003216000-memory.dmp

          Filesize

          88KB

        • memory/3428-26-0x0000000003220000-0x0000000003228000-memory.dmp

          Filesize

          32KB

        • memory/3428-27-0x000000001BC80000-0x000000001BC92000-memory.dmp

          Filesize

          72KB

        • memory/3428-28-0x0000000003230000-0x000000000323C000-memory.dmp

          Filesize

          48KB

        • memory/3428-29-0x000000001BC70000-0x000000001BC78000-memory.dmp

          Filesize

          32KB

        • memory/3428-30-0x000000001BC90000-0x000000001BCA0000-memory.dmp

          Filesize

          64KB

        • memory/3428-31-0x000000001BCB0000-0x000000001BCBA000-memory.dmp

          Filesize

          40KB

        • memory/3428-32-0x000000001BCC0000-0x000000001BD16000-memory.dmp

          Filesize

          344KB

        • memory/3428-33-0x000000001BD10000-0x000000001BD1C000-memory.dmp

          Filesize

          48KB

        • memory/3428-34-0x000000001BD20000-0x000000001BD28000-memory.dmp

          Filesize

          32KB

        • memory/3428-35-0x000000001BD30000-0x000000001BD3C000-memory.dmp

          Filesize

          48KB

        • memory/3428-36-0x000000001BD40000-0x000000001BD48000-memory.dmp

          Filesize

          32KB

        • memory/3428-23-0x00000000031E0000-0x00000000031E8000-memory.dmp

          Filesize

          32KB

        • memory/3428-38-0x000000001CC30000-0x000000001D158000-memory.dmp

          Filesize

          5.2MB

        • memory/3428-39-0x000000001C700000-0x000000001C70C000-memory.dmp

          Filesize

          48KB

        • memory/3428-40-0x000000001C710000-0x000000001C71C000-memory.dmp

          Filesize

          48KB

        • memory/3428-43-0x000000001C740000-0x000000001C74C000-memory.dmp

          Filesize

          48KB

        • memory/3428-24-0x00000000031F0000-0x0000000003200000-memory.dmp

          Filesize

          64KB

        • memory/3428-41-0x000000001C720000-0x000000001C728000-memory.dmp

          Filesize

          32KB

        • memory/3428-44-0x000000001C9C0000-0x000000001C9C8000-memory.dmp

          Filesize

          32KB

        • memory/3428-45-0x000000001C850000-0x000000001C85C000-memory.dmp

          Filesize

          48KB

        • memory/3428-47-0x000000001C870000-0x000000001C87E000-memory.dmp

          Filesize

          56KB

        • memory/3428-49-0x000000001C990000-0x000000001C99E000-memory.dmp

          Filesize

          56KB

        • memory/3428-52-0x000000001C9D0000-0x000000001C9D8000-memory.dmp

          Filesize

          32KB

        • memory/3428-51-0x000000001C9B0000-0x000000001C9BC000-memory.dmp

          Filesize

          48KB

        • memory/3428-50-0x000000001C9A0000-0x000000001C9A8000-memory.dmp

          Filesize

          32KB

        • memory/3428-48-0x000000001C980000-0x000000001C988000-memory.dmp

          Filesize

          32KB

        • memory/3428-46-0x000000001C860000-0x000000001C86A000-memory.dmp

          Filesize

          40KB

        • memory/3428-53-0x000000001C9E0000-0x000000001C9EA000-memory.dmp

          Filesize

          40KB

        • memory/3428-54-0x000000001C9F0000-0x000000001C9FC000-memory.dmp

          Filesize

          48KB

        • memory/3428-17-0x0000000000D10000-0x000000000107A000-memory.dmp

          Filesize

          3.4MB

        • memory/3428-22-0x000000001BC20000-0x000000001BC70000-memory.dmp

          Filesize

          320KB

        • memory/3428-21-0x00000000031C0000-0x00000000031DC000-memory.dmp

          Filesize

          112KB

        • memory/3428-20-0x00000000031A0000-0x00000000031A8000-memory.dmp

          Filesize

          32KB

        • memory/3428-19-0x00000000018A0000-0x00000000018AE000-memory.dmp

          Filesize

          56KB

        • memory/3428-18-0x0000000001890000-0x000000000189E000-memory.dmp

          Filesize

          56KB

        • memory/4444-96-0x000000001BED0000-0x000000001BEE2000-memory.dmp

          Filesize

          72KB